Behavioral task
behavioral1
Sample
81d39b5ef12effd2d6257164139ffc1ef06e3a4d7ffa7fcccc7d4137f6172afb.pdf
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
6696649068544000.zip
-
Size
68KB
-
MD5
5d944417094ca253544b72afe1ea0f4d
-
SHA1
01eef8b7f2c4d1f124bbee6e26d6610121385a57
-
SHA256
f581ff8847bed9b0aced447d6d6e3c1827005ec0d23ac79dc7bec22b854394fb
-
SHA512
b9ca3c7c5f27e5b8e28430d1a2031a25d535500fed5a0fbf31e41a9a122bc5381e1408d344adb110cd7c0a38fe9f0c2d29e5cf28792d94c32976a3b8c66a8f8a
-
SSDEEP
1536:QYNiEujbNl+r6cV90F3GktQPyw9evrXqc5fSmY:rNobyH901pt2N9evj5a5
Malware Config
Signatures
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
Processes:
resource yara_rule static1/unpack001/81d39b5ef12effd2d6257164139ffc1ef06e3a4d7ffa7fcccc7d4137f6172afb pdf_with_link_action
Files
-
6696649068544000.zip.zip
Password: infected
-
81d39b5ef12effd2d6257164139ffc1ef06e3a4d7ffa7fcccc7d4137f6172afb.pdf
-
https://bit.ly/34N0aWq
-
https://www.systemgroupglobal.com/58740
-